Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Path Planning for Vehicles Operating in Uncertain 2D Environments

    • 1st Edition
    • Viacheslav Pshikhopov
    • English
    Path Planning for Vehicles Operating in Uncertain 2D-environments presents a survey that includes several path planning methods developed using fuzzy logic, grapho-analytical search, neural networks, and neural-like structures, procedures of genetic search, and unstable motion modes.
  • Cellular Actuators

    Modularity and Variability in Muscle-inspired Actuation
    • 1st Edition
    • Jun Ueda + 2 more
    • English
    Cellular Actuators: Modularity and Variability in Muscle-Inspired Actuation describes the roles actuators play in robotics and their insufficiency in emerging new robotic applications, such as wearable devices and human co-working robots where compactness and compliance are important. Piezoelectric actuators, the topic of this book, provide advantages like displacement scale, force, reliability, and compactness, and rely on material properties to provide displacement and force as reactions to electric stimulation. The authors, renowned researchers in the area, present the fundamentals of muscle-like movement and a system-wide study that includes the design, analysis, and control of biologically inspired actuators. This book is the perfect guide for researchers and practitioners who would like to deploy this technology into their research and products.
  • Securing the Internet of Things

    • 1st Edition
    • Shancang Li + 1 more
    • English
    Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.
  • Wheeled Mobile Robotics

    From Fundamentals Towards Autonomous Systems
    • 1st Edition
    • Gregor Klancar + 3 more
    • English
    Wheeled Mobile Robotics: From Fundamentals Towards Autonomous Systemscovers the main topics from the wide area of mobile robotics, explaining all applied theory and application. The book gives the reader a good foundation, enabling them to continue to more advanced topics. Several examples are included for better understanding, many of them accompanied by short MATLAB® script code making it easy to reuse in practical work. The book includes several examples of discussed methods and projects for wheeled mobile robots and some advanced methods for their control and localization. It is an ideal resource for those seeking an understanding of robotics, mechanics, and control, and for engineers and researchers in industrial and other specialized research institutions in the field of wheeled mobile robotics. Beginners with basic math knowledge will benefit from the examples, and engineers with an understanding of basic system theory and control will find it easy to follow the more demanding fundamental parts and advanced methods explained.
  • Human Recognition in Unconstrained Environments

    Using Computer Vision, Pattern Recognition and Machine Learning Methods for Biometrics
    • 1st Edition
    • Maria De Marsico + 2 more
    • English
    Human Recognition in Unconstrained Environments provides a unique picture of the complete ‘in-the-wild’ biometric recognition processing chain; from data acquisition through to detection, segmentation, encoding, and matching reactions against security incidents. Coverage includes: Data hardware architecture fundamentals Background subtraction of humans in outdoor scenes Camera synchronization Biometric traits: Real-time detection and data segmentation Biometric traits: Feature encoding / matching Fusion at different levels Reaction against security incidents Ethical issues in non-cooperative biometric recognition in public spaces With this book readers will learn how to: Use computer vision, pattern recognition and machine learning methods for biometric recognition in real-world, real-time settings, especially those related to forensics and security Choose the most suited biometric traits and recognition methods for uncontrolled settings Evaluate the performance of a biometric system on real world data
  • Federal Cloud Computing

    The Definitive Guide for Cloud Service Providers
    • 2nd Edition
    • Matthew Metheny
    • English
    Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis. This updated edition will cover the latest changes to FedRAMP program, including clarifying guidance on the paths for Cloud Service Providers to achieve FedRAMP compliance, an expanded discussion of the new FedRAMP Security Control, which is based on the NIST SP 800-53 Revision 4, and maintaining FedRAMP compliance through Continuous Monitoring. Further, a new chapter has been added on the FedRAMP requirements for Vulnerability Scanning and Penetration Testing.
  • Creativity in Computing and DataFlow SuperComputing

    • 1st Edition
    • Volume 104
    • English
    Creativity in Computing and DataFlow Supercomputing, the latest release in the Advances in Computers series published since 1960, presents detailed coverage of innovations in computer hardware, software, theory, design, and applications. In addition, it provides contributors with a medium in which they can explore topics in greater depth and breadth than journal articles typically allow. As a result, many articles have become standard references that continue to be of significant, lasting value in this rapidly expanding field.
  • Misch's Avoiding Complications in Oral Implantology

    • 1st Edition
    • Carl E. Misch + 1 more
    • English
    See how to effectively manage ALL dental implant complications throughout ALL phases of treatment! Avoiding Complications in Oral Implantology provides evidence-based management protocols for a wide range of implant problems such as placement complications, malpositioning, bleeding, infection, and nerve injuries. Hundreds of high-quality, full-color photos and illustrations clearly demonstrate the complications and their resolution. Edited by Carl Misch and Randolph Resnik — both well-known names in dental implantology and prosthodontics — and with a team of expert contributors, this authoritative guide helps you handle the implant-related complications that can occur as more and more patients choose dental implants.
  • Computing and Visualization for Intravascular Imaging and Computer-Assisted Stenting

    • 1st Edition
    • Simone Balocco + 4 more
    • English
    Computing and Visualization for Intravascular Imaging and Computer-Assisted Stenting presents imaging, treatment, and computed assisted technological techniques for diagnostic and intraoperative vascular imaging and stenting. These techniques offer increasingly useful information on vascular anatomy and function, and are poised to have a dramatic impact on the diagnosis, analysis, modeling, and treatment of vascular diseases. After setting out the technical and clinical challenges of vascular imaging and stenting, the book gives a concise overview of the basics before presenting state-of-the-art methods for solving these challenges. Readers will learn about the main challenges in endovascular procedures, along with new applications of intravascular imaging and the latest advances in computer assisted stenting.
  • Rugged Embedded Systems

    Computing in Harsh Environments
    • 1st Edition
    • Augusto Vega + 2 more
    • English
    Rugged Embedded Systems: Computing in Harsh Environments describes how to design reliable embedded systems for harsh environments, including architectural approaches, cross-stack hardware/software techniques, and emerging challenges and opportunities. A "harsh environment" presents inherent characteristics, such as extreme temperature and radiation levels, very low power and energy budgets, strict fault tolerance and security constraints, etc. that challenge the computer system in its design and operation. To guarantee proper execution (correct, safe, and low-power) in such scenarios, this contributed work discusses multiple layers that involve firmware, operating systems, and applications, as well as power management units and communication interfaces. This book also incorporates use cases in the domains of unmanned vehicles (advanced cars and micro aerial robots) and space exploration as examples of computing designs for harsh environments.